论文标题
您真的需要掩盖普通服务器作为蜜罐吗?
Do You Really Need to Disguise Normal Servers as Honeypots?
论文作者
论文摘要
蜜罐是一种欺骗策略,已被广泛使用20年来缓解网络威胁。决策者认为,蜜罐策略是直观且有效的,因为蜜罐在现实情况下成功保护了系统免受拒绝服务(DOS)攻击(DOS)攻击(DOS)攻击(APT)。尽管如此,缺乏对选择现实世界操作的蜜罐技术应用的适当水平的研究。在本文中,我们研究并对比了有关蜜罐检测技术的三个攻击防御游戏。特别是,我们专门设计和对比蜜罐技术的两个阶段,从无欺骗的游戏开始。我们证明,使用Honeypots的防守者的回报率要比没有他们的防守者高,尽管防守者可能并不总是从使用更多的Honeypot欺骗策略中受益于财务上。特别是,将常规服务器伪装成蜜罐并不能为防守者提供更好的奖励。此外,我们考虑到假蜜罐可以使维持正常节点的成本更高。我们的研究为现实世界经营者的蜜罐欺骗策略和所需数量的蜜罐节点的决定提供了理论基础。
A honeypot, which is a kind of deception strategy, has been widely used for at least 20 years to mitigate cyber threats. Decision-makers have believed that honeypot strategies are intuitive and effective, since honeypots have successfully protected systems from Denial-of-Service (DoS) attacks to Advanced Persistent Threats (APT) in real-world cases. Nonetheless, there is a lack of research on the appropriate level of honeypot technique application to choose real-world operations. We examine and contrast three attack-defense games with respect to honeypot detection techniques in this paper. In particular, we specifically design and contrast two stages of honeypot technology one by one, starting with a game without deception. We demonstrate that the return for a defender using honeypots is higher than for a defender without them, albeit the defender may not always benefit financially from using more honeypot deception strategies. Particularly, disguising regular servers as honeypots does not provide defenders with a better reward. Furthermore, we take in consideration that fake honeypots can make maintaining normal nodes more costly. Our research offers a theoretical foundation for the real-world operator's decision of honeypot deception tactics and the required number of honeypot nodes.